[jira] [Commented] (TS-1584) Exposing client SSL certificate verification result in plugin API

2013-10-08 Thread James Peach (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-1584?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13790022#comment-13790022
 ] 

James Peach commented on TS-1584:
-

I think we can 

> Exposing client SSL certificate verification result in plugin API 
> --
>
> Key: TS-1584
> URL: https://issues.apache.org/jira/browse/TS-1584
> Project: Traffic Server
>  Issue Type: Improvement
>  Components: SSL, TS API
>Affects Versions: 3.3.4
>Reporter: Thach Tran
>Assignee: James Peach
>Priority: Minor
>  Labels: patch
> Fix For: 5.0.0
>
> Attachments: 
> 0001-Exposing-client-ssl-certificate-verification-result-.patch, 
> 0001-TS-1584-Retaining-some-info-from-client-certificate-.patch
>
>
> I'm writing an authentication plugin for traffic server and would like to 
> implement the following logic:
>   * If the client supplies valid certificate over ssl, allow the transaction 
> to proceed with no further authentication.
>   * Otherwise challenge the client with username/password authentication.
> Currently if I turn on client certificate checking in TS 
> (proxy.config.ssl.client.certification_level > 0), the result of the client 
> certificate verification happens at the SSLNetVConnection level and plugin 
> hooks have no knowledge of this. This makes implementing the aforementioned 
> logic not possible.



--
This message was sent by Atlassian JIRA
(v6.1#6144)


[jira] [Commented] (TS-1584) Exposing client SSL certificate verification result in plugin API

2013-10-08 Thread Leif Hedstrom (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-1584?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13789558#comment-13789558
 ] 

Leif Hedstrom commented on TS-1584:
---

[~jpe...@apache.org]What's the appropriate target fix version for this? 

> Exposing client SSL certificate verification result in plugin API 
> --
>
> Key: TS-1584
> URL: https://issues.apache.org/jira/browse/TS-1584
> Project: Traffic Server
>  Issue Type: Improvement
>  Components: SSL, TS API
>Affects Versions: 3.3.4
>Reporter: Thach Tran
>Assignee: James Peach
>Priority: Minor
>  Labels: patch
> Fix For: 5.0.0
>
> Attachments: 
> 0001-Exposing-client-ssl-certificate-verification-result-.patch, 
> 0001-TS-1584-Retaining-some-info-from-client-certificate-.patch
>
>
> I'm writing an authentication plugin for traffic server and would like to 
> implement the following logic:
>   * If the client supplies valid certificate over ssl, allow the transaction 
> to proceed with no further authentication.
>   * Otherwise challenge the client with username/password authentication.
> Currently if I turn on client certificate checking in TS 
> (proxy.config.ssl.client.certification_level > 0), the result of the client 
> certificate verification happens at the SSLNetVConnection level and plugin 
> hooks have no knowledge of this. This makes implementing the aforementioned 
> logic not possible.



--
This message was sent by Atlassian JIRA
(v6.1#6144)


[jira] [Commented] (TS-1584) Exposing client SSL certificate verification result in plugin API

2013-02-25 Thread James Peach (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-1584?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13586534#comment-13586534
 ] 

James Peach commented on TS-1584:
-

Yes.

> Exposing client SSL certificate verification result in plugin API 
> --
>
> Key: TS-1584
> URL: https://issues.apache.org/jira/browse/TS-1584
> Project: Traffic Server
>  Issue Type: Improvement
>  Components: SSL, TS API
>Affects Versions: 3.3.4
>Reporter: Thach Tran
>Assignee: James Peach
>Priority: Minor
>  Labels: patch
> Fix For: 3.3.2
>
> Attachments: 
> 0001-Exposing-client-ssl-certificate-verification-result-.patch, 
> 0001-TS-1584-Retaining-some-info-from-client-certificate-.patch
>
>
> I'm writing an authentication plugin for traffic server and would like to 
> implement the following logic:
>   * If the client supplies valid certificate over ssl, allow the transaction 
> to proceed with no further authentication.
>   * Otherwise challenge the client with username/password authentication.
> Currently if I turn on client certificate checking in TS 
> (proxy.config.ssl.client.certification_level > 0), the result of the client 
> certificate verification happens at the SSLNetVConnection level and plugin 
> hooks have no knowledge of this. This makes implementing the aforementioned 
> logic not possible.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Commented] (TS-1584) Exposing client SSL certificate verification result in plugin API

2013-02-19 Thread Leif Hedstrom (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-1584?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13581697#comment-13581697
 ] 

Leif Hedstrom commented on TS-1584:
---

In general, most structures in the APIs are opaque to the plugin writer, and we 
provide Get and Set methods to access member data. I'm guessing that's what 
James is referring to ?

> Exposing client SSL certificate verification result in plugin API 
> --
>
> Key: TS-1584
> URL: https://issues.apache.org/jira/browse/TS-1584
> Project: Traffic Server
>  Issue Type: Improvement
>  Components: SSL, TS API
>Affects Versions: 3.3.4
>Reporter: Thach Tran
>Assignee: James Peach
>Priority: Minor
>  Labels: patch
> Fix For: 3.3.1
>
> Attachments: 
> 0001-Exposing-client-ssl-certificate-verification-result-.patch, 
> 0001-TS-1584-Retaining-some-info-from-client-certificate-.patch
>
>
> I'm writing an authentication plugin for traffic server and would like to 
> implement the following logic:
>   * If the client supplies valid certificate over ssl, allow the transaction 
> to proceed with no further authentication.
>   * Otherwise challenge the client with username/password authentication.
> Currently if I turn on client certificate checking in TS 
> (proxy.config.ssl.client.certification_level > 0), the result of the client 
> certificate verification happens at the SSLNetVConnection level and plugin 
> hooks have no knowledge of this. This makes implementing the aforementioned 
> logic not possible.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Commented] (TS-1584) Exposing client SSL certificate verification result in plugin API

2013-02-18 Thread Thach Tran (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-1584?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13581099#comment-13581099
 ] 

Thach Tran commented on TS-1584:


Could you elaborate on what you mean by "an opaque structure"? I do agree that 
exposing more info about the client cert would be useful but as you mentioned 
previously, this is a starting point and there'll be chance to extend it 
further if needed.

> Exposing client SSL certificate verification result in plugin API 
> --
>
> Key: TS-1584
> URL: https://issues.apache.org/jira/browse/TS-1584
> Project: Traffic Server
>  Issue Type: Improvement
>  Components: SSL, TS API
>Affects Versions: 3.3.4
>Reporter: Thach Tran
>Assignee: James Peach
>Priority: Minor
>  Labels: patch
> Fix For: 3.3.1
>
> Attachments: 
> 0001-Exposing-client-ssl-certificate-verification-result-.patch, 
> 0001-TS-1584-Retaining-some-info-from-client-certificate-.patch
>
>
> I'm writing an authentication plugin for traffic server and would like to 
> implement the following logic:
>   * If the client supplies valid certificate over ssl, allow the transaction 
> to proceed with no further authentication.
>   * Otherwise challenge the client with username/password authentication.
> Currently if I turn on client certificate checking in TS 
> (proxy.config.ssl.client.certification_level > 0), the result of the client 
> certificate verification happens at the SSLNetVConnection level and plugin 
> hooks have no knowledge of this. This makes implementing the aforementioned 
> logic not possible.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Commented] (TS-1584) Exposing client SSL certificate verification result in plugin API

2013-02-18 Thread James Peach (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-1584?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13580709#comment-13580709
 ] 

James Peach commented on TS-1584:
-

Thanks for the new patch, Tach. I think that this is going in the right 
direction. I like TSClientCertInfo, though I would prefer that it was an opaque 
structure. I still believe that this API needs to be more general and 
extensible; for example, many applications will want to examine the full 
subject DN rather than just the CN.

> Exposing client SSL certificate verification result in plugin API 
> --
>
> Key: TS-1584
> URL: https://issues.apache.org/jira/browse/TS-1584
> Project: Traffic Server
>  Issue Type: Improvement
>  Components: SSL, TS API
>Affects Versions: 3.3.4
>Reporter: Thach Tran
>Assignee: James Peach
>Priority: Minor
>  Labels: patch
> Fix For: 3.3.1
>
> Attachments: 
> 0001-Exposing-client-ssl-certificate-verification-result-.patch, 
> 0001-TS-1584-Retaining-some-info-from-client-certificate-.patch
>
>
> I'm writing an authentication plugin for traffic server and would like to 
> implement the following logic:
>   * If the client supplies valid certificate over ssl, allow the transaction 
> to proceed with no further authentication.
>   * Otherwise challenge the client with username/password authentication.
> Currently if I turn on client certificate checking in TS 
> (proxy.config.ssl.client.certification_level > 0), the result of the client 
> certificate verification happens at the SSLNetVConnection level and plugin 
> hooks have no knowledge of this. This makes implementing the aforementioned 
> logic not possible.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Commented] (TS-1584) Exposing client SSL certificate verification result in plugin API

2013-02-17 Thread Thach Tran (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-1584?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13580466#comment-13580466
 ] 

Thach Tran commented on TS-1584:


Add an updated patch to also expose client cert's common name and issuer name.

> Exposing client SSL certificate verification result in plugin API 
> --
>
> Key: TS-1584
> URL: https://issues.apache.org/jira/browse/TS-1584
> Project: Traffic Server
>  Issue Type: Improvement
>  Components: SSL, TS API
>Affects Versions: 3.3.4
>Reporter: Thach Tran
>Assignee: James Peach
>Priority: Minor
>  Labels: patch
> Fix For: 3.3.1
>
> Attachments: 
> 0001-Exposing-client-ssl-certificate-verification-result-.patch, 
> 0001-TS-1584-Retaining-some-info-from-client-certificate-.patch
>
>
> I'm writing an authentication plugin for traffic server and would like to 
> implement the following logic:
>   * If the client supplies valid certificate over ssl, allow the transaction 
> to proceed with no further authentication.
>   * Otherwise challenge the client with username/password authentication.
> Currently if I turn on client certificate checking in TS 
> (proxy.config.ssl.client.certification_level > 0), the result of the client 
> certificate verification happens at the SSLNetVConnection level and plugin 
> hooks have no knowledge of this. This makes implementing the aforementioned 
> logic not possible.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Commented] (TS-1584) Exposing client SSL certificate verification result in plugin API

2012-11-21 Thread James Peach (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-1584?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13502566#comment-13502566
 ] 

James Peach commented on TS-1584:
-

I took a quick look and I'm generally positive. The main comment I have is that 
there is a lot more interesting SSL session information to expose, so we should 
think harder about making a more general API that can expose additional 
information as we want it.

> Exposing client SSL certificate verification result in plugin API 
> --
>
> Key: TS-1584
> URL: https://issues.apache.org/jira/browse/TS-1584
> Project: Traffic Server
>  Issue Type: Improvement
>  Components: SSL, TS API
>Affects Versions: 3.3.4
>Reporter: Thach Tran
>Priority: Minor
>  Labels: patch
> Attachments: 
> 0001-Exposing-client-ssl-certificate-verification-result-.patch
>
>
> I'm writing an authentication plugin for traffic server and would like to 
> implement the following logic:
>   * If the client supplies valid certificate over ssl, allow the transaction 
> to proceed with no further authentication.
>   * Otherwise challenge the client with username/password authentication.
> Currently if I turn on client certificate checking in TS 
> (proxy.config.ssl.client.certification_level > 0), the result of the client 
> certificate verification happens at the SSLNetVConnection level and plugin 
> hooks have no knowledge of this. This makes implementing the aforementioned 
> logic not possible.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Commented] (TS-1584) Exposing client SSL certificate verification result in plugin API

2012-11-21 Thread JIRA

[ 
https://issues.apache.org/jira/browse/TS-1584?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13502288#comment-13502288
 ] 

Igor Galić commented on TS-1584:


+1



-- 
Sent from my Android phone with K-9 Mail. Please excuse my brevity.


> Exposing client SSL certificate verification result in plugin API 
> --
>
> Key: TS-1584
> URL: https://issues.apache.org/jira/browse/TS-1584
> Project: Traffic Server
>  Issue Type: Improvement
>  Components: SSL, TS API
>Affects Versions: 3.3.4
>Reporter: Thach Tran
>Priority: Minor
>  Labels: patch
> Attachments: 
> 0001-Exposing-client-ssl-certificate-verification-result-.patch
>
>
> I'm writing an authentication plugin for traffic server and would like to 
> implement the following logic:
>   * If the client supplies valid certificate over ssl, allow the transaction 
> to proceed with no further authentication.
>   * Otherwise challenge the client with username/password authentication.
> Currently if I turn on client certificate checking in TS 
> (proxy.config.ssl.client.certification_level > 0), the result of the client 
> certificate verification happens at the SSLNetVConnection level and plugin 
> hooks have no knowledge of this. This makes implementing the aforementioned 
> logic not possible.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira